| Improper Input Validation | |
| Information Exposure | |
| Command Injection | |
| SQL Injection | |
| Incorrect Authorization | |
| SQL Injection | |
| XML Injection | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Command Injection | |
| Improper Neutralization of Special Elements Used in a Template Engine | |
| Access Control Bypass | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Denial of Service (DoS) | |
| Denial of Service (DoS) | |
| Cross-site Scripting (XSS) | |
| Server-side Request Forgery (SSRF) | |
| XML Injection | |
| XML Injection | |
| Improper Input Validation | |
| SQL Injection | |
| Server-side Request Forgery (SSRF) | |
| Improper Input Validation | |
| Server-side Request Forgery (SSRF) | |
| Cross-site Scripting (XSS) | |
| Cross-site Request Forgery (CSRF) | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| Access Control Bypass | |
| Missing Support for Integrity Check | |
| Improper Authorization | |
| Improper Check for Unusual or Exceptional Conditions | |
| Incorrect Authorization | |
| Cross-site Scripting (XSS) | |
| Access Control Bypass | |
| Access Control Bypass | |
| Access Control Bypass | |
| Access Control Bypass | |
| Information Exposure | |
| Access Control Bypass | |
| Access Control Bypass | |
| Improper Authorization | |
| Directory Traversal | |
| Cross-site Scripting (XSS) | |
| Time-of-check Time-of-use (TOCTOU) Race Condition | |
| Time-of-check Time-of-use (TOCTOU) Race Condition | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Cross-site Scripting (XSS) | |
| Improper Authorization | |